Just when you thought Windows 10 Mobile is dead, here’s Microsoft rolling out a new cumulative update for the platform as part of its February patching cycle.

Windows 10 cumulative update KB4074592, which is also released on PCs running the Creators Update (version 1703) – phones have never received the Fall Creators Update, comes with little changes for mobile devices, though it does something that many users might notice.

Microsoft doesn’t provide a separate change log for mobile and PC, so the release notes that you can find at the end of the article include all the improvements and security fixes that Microsoft included in KB4074592 for both platforms.

Debian 7 Wheezy LTS period ends on May 31st and some companies asked Freexian if they could get security support past this date. Since about half of the current team of paid LTS contributors is willing to continue to provide security updates for Wheezy, I have started to work on making this possible.

While Elon Musk was busy planning how to launch his Tesla Roadster into the depths of space last month, a hacker was silently using Tesla’s computing power to mine an unknown amount of cryptocurrency.

The unidentified attackers found their way in through cracks in Tesla’s cloud environment, according to a report issued by RedLock security on February 20. The miners were able to gain access via an unprotected Tesla Kubernete console—an open source system that manages applications. Included on this console were the access credentials to Tesla’s Amazon Web Service. Once they obtained access to the console, the attackers were able to run scripts that allowed them to stealthily mine cryptocurrency.

A user was able to gain access to our LDAP database and has published the email addresses and names, as well as apparent password hashes, of anyone who has signed up to identity.mageia.org. However, the published hashes do not match those on record, and all capitalisation has been removed, so it is not clear that the actual passwords have been compromised. All of the passwords have since been reset as a security precaution. New rules have been added to prevent access to the LDAP server. The sysadmins are investigating how the fields were read, as the configuration should have specifically prevented this.

The passwords stored by the Mageia LDAP server are hashed and salted, meaning that the full decryption of the password, if they have actually been leaked, into a human-usable format would require significant computing power for safe and complex passwords.

UBports devs announced today on Twitter that Canonical sent them a few old Ubuntu Phone devices to continue the development of the Ubuntu Touch mobile operating system.

Now that Canonical has ceased the development of its revolutionary Unity 8 user interface for the Ubuntu Touch mobile operating system used on smartphones from Meizu and BQ, the company decided to donate several devices to the UBports community.

UBports is recreating Ubuntu Touch, maintaining, updating, and modifying its code to offer the world a free and open source mobile operating system for those who want to use something else than Android, iOS, and what else is still out there.

Last week, we talked with The Document Foundation's marketing assistant Mike Saunders about the 1 million downloads milestone reached by the major LibreOffice 6.0 release in only two weeks after its launch, who told us that the team is already working on the next version, LibreOffice 6.1, due for release in August.

LibreOffice 6.1 will be the first major update to the 6.x series of the office suite and will add yet another layer of new features and improvements to the open-source and cross-platform office suite used by millions of computer users worldwide, and we'd like you to be the first to know about them.

Microchip unveiled an open source, mainline Linux ready “SAMA5D27 SOM” module based on a SiP implementation of its Cortex-A5-based SAMA5D27 SoC with 128MB RAM. The 40 x 38mm module is also available with a SOM1-EK1 dev board.

Long before it was acquired by Microchip Technology, Atmel has been producing a line of Linux-focused, Cortex-A5 based SAMA5 SoCs, but the only Atmel-branded SAMA5 boards were its open-spec Xplained development boards developed with Newark Element14. The SAMA5 family was always a side business to Atmel’s MCU line, with very little integration between the two. With its ATSAMA5D27-SOM1 (SAMA5D27 SOM1) module, which uses a system-in-package (SiP) implementation of Microchip’s SAMA5D27 SoC, Microchip is starting to bridge the gap between the SAMA5 product line and its much larger RTOS/MCU business.

For Purism, the company that sells quality computers using a Linux-based operating system and are intended to protect user's privacy and freedom, designing a convergent Linux phone is a long-term goal to unify the mobile experience across various devices.

Purism's François Téchené shares some initial details on how the company plans to use convergence for their short and long-term design goals of Librem 5, the Linux smartphone that raised more than $2 million on Kickstarter last year, saying they're looking to unify the human experience across different device you might own.

In 2015, Google released Kubernetes as an open source project. It was an implementation of Google's internal system called Borg. Google and the Linux Foundation created the Cloud-Native Computing Foundation (CNCF) to host Kubernetes (and other cloud-native projects) as an independent project governed by a community around it. Kubernetes quickly became one of the fastest growing open source projects in history, growing to thousands of contributors across dozens of companies and organizations.

What makes Kubernetes so incredible is its implementation of Google's own experience with Borg. Nothing beats the scale of Google. Borg launches more than 2-billion containers per week, an average of 3,300 per second. At its peak, it's many, many more. Kubernetes was born in a cauldron of fire, battle-tested and ready for massive workloads.

Akraino will offer users new levels of flexibility to scale edge cloud services quickly, to maximize the applications or subscribers supported on each server, and to help ensure the reliability of systems that must be up at all times. While several open source projects exist to help solve pieces of the puzzle, nothing currently meets the need for an edge infrastructure solution. Integration of existing efforts in this new project will help deliver ease of use, hardened reliability, unique features, and performance for carrier, provider, and IoT networks.

It all started when the Shadow Brokers dumped a collection of NSA cyberweapons that the NSA had fashioned from unreported bugs in commonly used software, including versions of Windows. The NSA discovered these bugs and then hoarded them, rather than warning the public and/or the manufacturers about them, in order to develop weapons that turned these bugs into attacks that could be used against the NSA's enemies.

Flight sim company FlightSimLabs has found itself in trouble after installing malware onto users' machines as an anti-piracy measure. Code embedded in its A320-X module contained a mechanism for detecting 'pirate' serial numbers distributed on The Pirate Bay, which then triggered a process through which the company stole usernames and passwords from users' web browsers.

This past week we’ve been focusing on a number of open pull requests, getting closer to merging improvements to our storage volume handling, unix char/block devices handling and the massive clustering branch that’s been cooking for a while.

We’re hoping to see most of those land at some point this coming week.

On the LXC side of things, the focus was on bugfixes and cleanups as well as preparing for the removal of the python3 and lua bindings from the main repository. We’re also making good progress on distrobuilder and hope to start moving some of our images to using it as the build tool very soon.

What would happen if we discovered the existence of alien life? A question I've often asked and a question many games, films and books have covered in great detail. The Station [Steam] is a sci-fi mystery that sees you investigate The Espial, a space station sent to research a sentient alien civilization.

The last months for Kdenlive have been very quiet from the outside – we were not very active on the bugtracker, did not make a lot of announcements, and the 17.12.x release cycle only contained very few minor bugfixes.

The main reason for this was the huge work that went behind the scenes for a major code refactoring that was required to allow further developments. So after more than a year working on it, we hope to get ready for the 18.04 release!

I did Archaeology in University and I love history, mythology, folklore and nature. I’ve always been drawing from an early age. I graduated in 2003 with an archaeology degree. I taught myself digital art and web coding skills for fun and practical reasons. I used to do self-employed web design and admin type jobs, but in 2013 I became disillusioned with my life and had depression. I took a Foundation art course in 2013 deciding to pursue my artistic passions instead.

Accessibility technology encompasses assistive tools such as screen readers, magnifiers and braille displays, as well as APIs and frameworks that allow applications to expose elements of their UI to such tools.

This would totally have been a tweet or a facebook post, but I’ve decided to invest a little more energy and post these on my blog, accessible to everybody. Getting old, I guess. We’re all mortal and the web isn’t open by its own.

In the past few days I’ve been learning about CSS grid while redesigning Flatpak and Flathub sites (still coming). And with the knowledge of really grokking only a fraction of it, I’m in love.

Working on a new open source project, you're focused on the code—getting that great new idea released so you can share it with the world. And you'll want to attract new contributors, so you need a terrific name for your project.

We've all read guides for creating names, but how do you go about choosing the right one? Keeping that cool science fiction reference you're using internally might feel fun, but it won't mean much to new users you're trying to attract. A better approach is to choose a name that's memorable to new users and developers searching for your project.

Names set expectations. Your project's name should showcase its functionality in the ecosystem and explain to users what your story is. In the crowded open source software world, it's important not to get entangled with other projects out there. Taking a little extra time now, before sending out that big announcement, will pay off later.

It’s been a few weeks now since FOSDEM and if you didn’t have a chance to attend or watch the livestream of the FOSDEM 2018 Community DevRoom, Leslie my co-chair, and I are doing a round up summary on posts on each of the talks to bring you the video and the highlights of each presentation. You can read the preview post of Rich Sands and Simon Phipps pre FOSDEM blog post here.

My name is Mario Fusco and I’m honored to be the Program Committee Lead of Voxxed Days Zurich for the third year in a row. Reading, evaluating, discussing, and selecting from the 200+ proposals that arrive every year is a long and challenging process. I must admit, I largely underestimated the task the first year I started doing it. It’s necessary to evaluate not only the quality of every submission, but also how they fit together. In the end, the worst part is having to reject so many incredible proposals because there are a limited number of slots.

However, once all the talks have been selected and all the approval and rejection emails have been sent, the process is still not complete. Now it is time to take all the accepted talks and schedule the actual program. Even for a moderate sized event like Voxxed Days Zurich (the conference lasts only one day and we have four parallel tracks), this is not a trivial task. There are many constraints and nice-to-haves that you may need to consider. For example, some speakers will arrive late in the morning or will have to leave early in the afternoon. Some talks require different room capacities. Two talks belonging to the same track must not be scheduled at the same time. There are many more variables to this process.

Last year, the National Science Foundation (NSF) and Mozilla announced the Wireless Innovation for a Networked Society (WINS) challenges: $2 million in prizes for big ideas to connect the unconnected across the U.S.

Today, we’re announcing our first set of winners: 20 bright ideas from Detroit, Cleveland, Albuquerque, New York City, and beyond. The winners are building mesh networks, solar-powered Wi-Fi, and network infrastructure that fits inside a single backpack. Winning projects were developed by veteran researchers, enterprising college students, and everyone in-between.

What do all these projects have in common? They’re affordable, scalable, open-source, and secure.

ArangoDB, a provider of native multi-model NoSQL database solutions, announced the latest findings of its open source NoSQL performance benchmark series. To enable vendors to respond to the results and contribute improvements, ArangoDB has published the necessary scripts required to repeat the benchmark.

For those of us who have been holding out to see an Oracle-supported port of DTrace on Linux, that time is nearly here. Oracle just re-licensed the system instrumentation tool from the original CDDL to GPLv2.

The OpenIndiana project is still alive and well with a recent announcement of migrating the project to GCC 6.4. Unfortunately, this version does not cover the Spectre/Meltdown vulnerabilities, although the next version planned is 7.3 which will cover these hot issues.

The movement was formally founded in 1983 by Richard Stallman with the launch of the GNU Project, which was founded on the idea that proprietary software harms users to the benefit of large corporations.

Ever since its launch last August, bitcoin has had an antagonistic relationship with its offshoot, bitcoin cash. But their battle may have provided a trigger to seek ways to protect bitcoin’s core code from indiscriminate use.

University of Maryland student Kayla Little has wanted to be a doctor since she was 11 years old — but a nationwide rise in textbook prices has proved to be an obstacle to her success.

"I've wanted to go into medicine for the longest [time], and I really don't want to give that up for books," said Little, who hopes to go to medical school and become an orthopedic surgeon for a professional sports team.

From its founding in 1965, the Grateful Dead was always an unusual band. Rising amidst the counterculture movement in the San Francisco Bay Area, the Grateful Dead’s music had roots in multiple styles and genres but did not lend itself to easy categorization. Was it psychedelic? Folk? Blues? Country? Yes, it was all of these and more. The band frequently performed well-known public domain songs, but they made the songs their own.

Members of the band could effortlessly play across traditional and diverse styles. At concerts, they often performed songs that sounded familiar at first but grew and evolved across styles and genres. Songs often turned into lengthy jam sessions in which musicians played off one another, discovering new musical motifs and expanding them together.

Librsvg feels like it is reaching a tipping point, where suddenly it seems like it would be easier to just port some major parts from C to Rust than to just add accessors for them. Also, more and more of the meat of the library is in Rust now.

I'm switching back and forth a lot between C and Rust these days, and C feels very, very primitive these days.

I have written several books that use Python to explain topics like Bayesian Statistics and Digital Signal Processing. Along with the books, I provide code that readers can download from GitHub. In order to work with this code, readers have to know some Python, but that's not enough. They also need a computer with Python and its supporting libraries, they have to know how to download code from GitHub, and then they have to know how to run the code they downloaded.

If you’re looking for an easy way to edit application launchers and menu entries on Ubuntu you’ll want to check out AppEditor.

AppEditor is an easy to use

Alacarte has been the go-to menu editor for almost as long as I’ve been using Ubuntu. It’s still perfectly functional, but it hasn’t really changed since then.

‘AppEditor’ would probably be better named Menu Entry Editor or Launcher Editor, or something other than App Editor as, rather than edit apps, it lets you edit app menu entries for apps, rather than the apps itself.

Juju is Canonical’s open source modelling tool for cloud software — it handles operations designed to deploy, configure, manage, maintain and scale applications via the command line interface, or through its optional GUI.

As Huawei's budget brand, Honor handsets are well known for offering good value for money. With the Honor 9 Lite the 'good value' theme is raised a notch, thanks to an 18:9 aspect ratio 5.65-inch screen and no fewer than four cameras.

Judging by its name, you might expect the Honor 9 Lite to be a trimmed-down version of the Honor 9, but there are some significant variances that suggest the new handset is a step sideways rather than a step down.

The Honor 9's 5.15-inch 1,080-by-1,920 (16:9) screen is trumped here by a bigger, taller 5.65-inch 1,080-by-2,160 (18:9) display. There are also dual cameras front and back, whereas the Honor 9 only has dual rear cameras. At the time of writing the Honor 9 is selling for £349 (inc. VAT) direct from Honor, so the Honor 9 Lite's £199.99 looks very appealing.

Linux history – the record of commands that you’ve used on the command line – can simplify repeating commands and provide some very useful information when you’re trying to track down how recent system or account changes might have come about. Two things you need to understand before you begin your sleuthing, however, are that the shell’s command memory can be selective and that dates and times for when commands were run are optional.

When poll workers arrived at 6 a.m. to open the voting location in Allentown, New Jersey, for last November’s gubernatorial election, they found that none of the borough’s four voting machines were working. Their replacements, which were delivered about four hours later, also failed. Voters had to cast their ballots on paper, which then were counted by hand.

Machine malfunctions are a regular feature of American elections. Even as worries over cybersecurity and election interference loom, many local jurisdictions depend on aging voting equipment based on frequently obsolete and sometimes insecure technology. And the counties and states that fund elections have dragged their heels on providing the money to buy new equipment.

There is still no clear proof that the Russian government interfered with the 2016 U.S. election in any meaningful way. Which is weird, because Russia and every other country on earth would be perfectly justified in doing so.

You may have been asked if you'd like to try your hand at mining cryptocurrency. You may have demurred, citing the shortage in graphics cards or perhaps wary you were being coaxed into an elaborate Ponzi scheme. So much for opting out. Thanks to the NSA, you may be involved in mining cryptocurrency, but you're likely not seeing any of the benefits.

Separately, researchers from security firm FireEye said attackers, presumably with no relation to the one reported by Check Point, are exploiting unpatched systems running Oracle's WebLogic Server to install cryptocurrency-mining malware. Oracle patched the vulnerability, indexed as CVE-2017-10271, in October.

The iPhone X has set a new benchmark for smartphone prices and bolstered Apple Inc.’s bottom line, but its steep price may be hobbling its future in Asia’s biggest markets and allowing Chinese challengers to grab market share.

In a new patent granted by the World Intellectual Property Organization (WIPO), BlackBerry invented a new camera design. The patent, originally applied for in 2016, outlines a new style of camera, presumably for smartphones, that operates with a second and alternating lens. This particular style of camera modification is called a conversion lens. In order to function as intended, the new camera design must be housed in a sliding host-device. Specifically, the sensor would reside in the rear of a screen display panel, and the auxiliary panel would bear a second translucent lens that modifies the first camera. In theory, the optical lenses would be aligned for fisheye, wide angle, or telephoto images and then the main lens would be used for normal shots and videos.

The Korean technology giant is expected to reveal Galaxy S9 on February 25. But, due to tons of leaks, it doesn’t seem that much mystery is left to the S9. There are tons of leaked images and details circulating on the web, thanks to German website WinFuture and Redditors.

More in Tux Machines

Why open source could be IBM's key to future success in the cloud

Do those same developers need IBM? Developers certainly benefit from IBM's investments in open source, but it's not as clear that those same developers have much to gain from IBM's cloud. Google, for example, has done a stellar job open sourcing code like TensorFlow and Kubernetes that feeds naturally into running related workloads on Google Cloud Platform. Aside from touting its Java bonafides, however, IBM has yet to demonstrate that developers get significant benefits for modern workloads on its cloud.
That's IBM's big challenge: Translating its open source expertise into real, differentiated value for developers on its cloud.

Top 8 Debian-Based Distros

Most people tend to forget that despite Ubuntu's success over the years, it's still just a distro based on another distro - Debian. Debian on its own, however, isn't really well suited for newer users...hence the explosion of distros based on Debian over the recent years. There are lot of great choices for Linux users. Which one is best for you?

Compact, rugged IoT gateway offers dual GbE with PoE

Inforce has launched a $250 “Inforce 6320” IoT gateway that runs Linux on a quad -A53 Snapdragon 410, and offers WiFi, BT, GPS, HDMI, USB, -30 to 85°C support, and dual GbE ports with PoE.
Inforce Computing’s $250 Inforce 6320 is a compact (170 x 95 x 42mm) IoT gateway that runs Ubuntu Core (Snappy) and Debian on Qualcomm’s Snapdragon 410E. Inforce promises “periodic upstream kernel based BSP releases [that] include in-depth documentation along with a host of royalty-free software.” The Debian BSP includes LXDE, drivers for all available interfaces, as and access to the Inforce TechWeb tech support services.